Vulnerabilities / Threats
6/10/2013
02:49 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Palo Alto Networks Brings WildFire To The Private Cloud

Palo Alto Networks WF-500 appliance offers sandbox detection and analysis capabilities

Santa Clara, Calif., June 3, 2013 – Palo Alto Networks® (NYSE: PANW), the network security company&trade, today announced availability of the Palo Alto Networks WF-500 appliance, the first platform designed to deliver a private cloud solution for timely and thorough detection, analysis and prevention of advanced persistent threats (APTs).

Designed to meet the needs of customers with restrictions that preclude them from accessing a public cloud option, the Palo Alto Networks WF-500 appliance delivers the comprehensive sandbox detection and analysis capabilities of the Palo Alto Networks public cloud based WildFire subscription offering on a customer-owned platform. When deployed with an inline Palo Alto Networks next-generation firewall, the WF-500 also offers full prevention capabilities.

Only Palo Alto Networks offers this kind of "closed loop" prevention solution that includes private or public cloud deployment options, thorough detection and analysis of all network traffic, and the ability to automatically block malware and APTs with the Palo Alto Networks next-generation firewall.

QUOTES

· Securosis Analyst and President Mike Rothman commented on the benefits of a private cloud approach in a recent blog ("Network-based Malware Detection 2.0: Scaling NBMD"): "These malware-analysis private clouds provide a central analysis device and interact with enforcement points throughout the network. This provides the leverage of not having to deploy NBMD devices at all ingress points, as well as facilitating internal sharing of intelligence."

· "Quickly identifying and eliminating previously unknown threats across all applications is key to protecting an organization from today's advanced threats; only Palo Alto Networks offers its customers a public or private cloud deployment choice and the closed loop capabilities to most efficiently and effectively stop APTs," said Lee Klarich, senior vice president of product management, Palo Alto Networks.

Wildfire offers Superior Detection, Analysis and Prevention

Now used by more than 1,700 customers globally, the WildFire service aggregates suspicious files flagged by Palo Alto Networks next-generation firewalls deployed at customer sites around the world. The files are uploaded for analysis by Palo Alto Networks systems and experts. If a file is determined to be malware or an APT, a signature is generated and automatically sent to subscribing Palo Alto Networks WildFire customers' next-generation firewalls to provide protection from:

· The newly detected malware and its variants;

· Traffic that malware generates including unique domain queries; and

· Command-and-control and domain name system (DNS) traffic.

The WF-500 appliance offers these same advantages on a secure device inside the customer's network. Customers are then free to detect, analyze, and eradicate suspected threats in a private cloud under their control. If they choose to, they are also free to share confirmed findings with or receive updated malware signatures from the WildFire cloud service.

Availability

The Palo Alto Networks WF-500 appliance is available now. For more information and pricing, contact a local reseller or visit http://www.paloaltonetworks.com.

About Palo Alto Networks

Palo Alto Networks is the network security company. Its innovative platform allows enterprises, service providers, and government entities to secure their networks and safely enable the increasingly complex and rapidly growing number of applications running on their networks. The core of Palo Alto Networks platform is its Next-Generation Firewall, which delivers application, user, and content visibility and control integrated within the firewall through its proprietary hardware and software architecture. Palo Alto Networks products and services can address a broad range of network security requirements, from the data center to the network perimeter, as well as the distributed enterprise, which includes branch offices and a growing number of mobile devices. Palo Alto Networks products are used by more than 12,500 customers in over 100 countries. For more information, visit www.paloaltonetworks.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-1978
Published: 2015-05-21
Multiple cross-site request forgery (CSRF) vulnerabilities in Simple PHP Agenda 2.2.8 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) add an administrator via a request to auth/process.php, (2) delete an administrator via a request to auth/admi...

CVE-2015-0741
Published: 2015-05-21
Multiple cross-site request forgery (CSRF) vulnerabilities in Cisco Prime Central for Hosted Collaboration Solution (PC4HCS) 10.6(1) and earlier allow remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCut04596.

CVE-2015-0742
Published: 2015-05-21
The Protocol Independent Multicast (PIM) application in Cisco Adaptive Security Appliance (ASA) Software 9.2(0.0), 9.2(0.104), 9.2(3.1), 9.2(3.4), 9.3(1.105), 9.3(2.100), 9.4(0.115), 100.13(0.21), 100.13(20.3), 100.13(21.9), and 100.14(1.1) does not properly implement multicast-forwarding registrati...

CVE-2015-0746
Published: 2015-05-21
The REST API in Cisco Access Control Server (ACS) 5.5(0.46.2) allows remote attackers to cause a denial of service (API outage) by sending many requests, aka Bug ID CSCut62022.

CVE-2015-0915
Published: 2015-05-21
Cross-site scripting (XSS) vulnerability in RAKUS MailDealer 11.2.1 and earlier allows remote attackers to inject arbitrary web script or HTML via a crafted attachment filename.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.